integrity encryption APT phishing spam firewall Cyber Security hacker IPS IOC risk exploit IoT training vishing bug identity theft rootkit packet worm IDS HIPAA network IP Defense- in-depth resilience cryptography spoofing business continuity passphrase incident response defense evasion VPN incident pentest risk assessment OS antivirus escalation WISP admin Proofpoint Cyber Defense insider threat password ransomware availability spyware virus smishing compliance DDoS breach botnet vulnerability Security Operations PII zero- day cyber attack PHI MFA EDR social engineering malware BEC SyssecAdmin Dark Web FTP CIA triad security awareness confidentiality security policy integrity encryption APT phishing spam firewall Cyber Security hacker IPS IOC risk exploit IoT training vishing bug identity theft rootkit packet worm IDS HIPAA network IP Defense- in-depth resilience cryptography spoofing business continuity passphrase incident response defense evasion VPN incident pentest risk assessment OS antivirus escalation WISP admin Proofpoint Cyber Defense insider threat password ransomware availability spyware virus smishing compliance DDoS breach botnet vulnerability Security Operations PII zero- day cyber attack PHI MFA EDR social engineering malware BEC SyssecAdmin Dark Web FTP CIA triad security awareness confidentiality security policy
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
integrity
encryption
APT
phishing
spam
firewall
Cyber Security
hacker
IPS
IOC
risk
exploit
IoT
training
vishing
bug
identity theft
rootkit
packet
worm
IDS
HIPAA
network
IP
Defense-in-depth
resilience
cryptography
spoofing
business continuity
passphrase
incident response
defense evasion
VPN
incident
pentest
risk assessment
OS
antivirus
escalation
WISP
admin
Proofpoint
Cyber Defense
insider threat
password
ransomware
availability
spyware
virus
smishing
compliance
DDoS
breach
botnet
vulnerability
Security Operations
PII
zero-day
cyber attack
PHI
MFA
EDR
social engineering
malware
BEC
SyssecAdmin
Dark Web
FTP
CIA triad
security awareness
confidentiality
security policy